Patent application number | Description | Published |
20090094238 | TECHNIQUES FOR IDENTIFYING A MATCHING SEARCH TERM IN AN IMAGE OF AN ELECTRONIC DOCUMENT - A technique for facilitating identification of a matching search term in one or more images includes selecting at least a portion of an image and creating search enriched metadata for a document that includes the image. The search enriched metadata includes a text portion that provides one or more search terms that are associated with the selected portion of the image and a location portion that provides a location of the selected portion of the image. | 04-09-2009 |
20090106348 | METHOD AND SYSTEM FOR LIMITING INSTANCES OF A CLIENT-SERVER PROGRAM WITHIN A RESTRICTED DISTRIBUTED NETWORK - The present invention provides a computer implemented method, data processing system and computer program product for limiting instances of a client-server program within a plurality of platforms in a restricted distributed network. The data processing system receives an invocation of the client-server program. The data processing system assigns a write file to the client-server program wherein the write file has a write file name and the write file is on a distributed file system accessible to the plurality of platforms. The data processing system determines whether the write file is available. Responsive to a determination that the write file is available, the data processing system opens the write file for writing wherein the write file is associated with the client-server program. The data processing system, responsive to a determination that the write file is available, forms an addressing file having addressing information of a first instance of the client-server program. The data processing system responsive to a determination that the write file is available, reports the addressing file by writing addressing information to the addressing file, wherein the addressing file is established at a predetermined logical location in the distributed file system. The data processing system responsive to the determination that the write file is available, executes at least one instruction of the client-server program. | 04-23-2009 |
20090106367 | TRIGGERING A COMMUNICATION SYSTEM TO AUTOMATICALLY REPLY TO COMMUNICATIONS - A communication system which facilitates distribution of electronic communications for a user account includes an emergency auto-reply agent that scans each received communication addressed to the user account for a particular communication sent from at least one emergency address specified for the user account separate from the address of the user account. Responsive to the communication system detecting the particular communication sent from one of the emergency addresses, the emergency auto-reply agent parses the content of the particular communication to detect whether the particular communication comprises a required password. Responsive to detecting the required password within the content of the particular communication, the emergency auto-reply agent directs the communication system to compose and send auto-reply communications from the user account in reply to received communications addressed to the user account. | 04-23-2009 |
20100011312 | RFID READER INTEGRATION TO VIRTUAL WORLD MONITORING - Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective. | 01-14-2010 |
20100011413 | METHOD FOR AND APPARATUS FOR RETRIEVING USERNAME AND PASSWORD IN AN AUTHENTICATION PROTOCOL - Disclosed is a computer implemented method and apparatus to retrieve authentication records required for user validation and creation of authentication credentials from an authentication sever to be passed to the user. The method is comprised of the authentication server storing a first authentication record, then generating a first authentication credential based on the first authentication record. The authentication server associates the first authentication record with a first credential expiration time. The authentication server stores a second authentication record. The authentication server generates a second authentication credential based on the second authentication record, wherein the second authentication credential is associated with a second credential expiration time. Next, the authentication server associates the second authentication credential with a second credential expiration time. The authentication server determines that the first credential expiration time is earlier than the second credential expiration time and caches the first authentication record to cache. | 01-14-2010 |
20100156909 | ENHANCED VISIBILITY OF AVATARS SATISFYING A PROFILE - Disclosed is a computer implemented method, computer program product, and apparatus to decorate visible attributes of a rendered avatar. A server may collect a first user profile of a first avatar, the first user profile having at least one interest of a user. Next, the server may receive a location of the first avatar, wherein the location is associated with a view to at least a second avatar. The server can identify the second avatar among a group of avatars visible with respect to the first avatar. Further, the server may read a target profile of the second avatar then determine whether the second user profile satisfies a criterion based on the first user profile and the target profile. In addition, the server may render a modified rendered avatar to a client, responsive to the determination that the target profile satisfies the criterion. | 06-24-2010 |
20100312868 | Logically Partitioned System Having Subpartitions with Flexible Network Connectivity Configuration - A method of configuring a data processing system for facilitating network communications involves creating a primary logical partition (LPAR) in the data processing system, the LPAR configured to host a specified operating system. The method further includes creating a first virtual network adapter within the LPAR, associating the first virtual network adapter with a first network address, and binding the first virtual network adapter to the LPAR. The method additionally involves creating a first logical subpartition (LSPAR) within the LPAR, the first LSPAR configured to employ said specified operating system and no other. The method also includes creating a second virtual network adapter within the LPAR, associating the second virtual network adapter with a second network address, wherein the second network address is not an alias network address of the first network address, and binding the second virtual network adapter to the first LSPAR. | 12-09-2010 |
20100324751 | APPARATUS, SYSTEM, AND METHOD FOR EFFICIENT USE OF MIRRORED STORAGE CLOUDS - An apparatus, system, and method are disclosed for distributing data requests between data centers. A request module receives a data operation request from a client. The data operation request corresponds to mirrored data stored at a plurality of data centers. A metadata module maintains a set of data center cooling efficiency factors for each of the plurality of data centers. Each data center cooling efficiency factor comprises data relating to operational costs of a data center. A cost reduction module compares sets of data center cooling efficiency factors for each of the plurality of data centers to select the most efficient data center from the plurality of data centers. A response module sends the data operation request to the selected data center. | 12-23-2010 |
20110161712 | COOLING APPLIANCE RATING AWARE DATA PLACEMENT - Physical storage systems dissipate large amounts of heat as a result of operations performed on data stored on the physical storage systems. Existing cooling mechanisms use cooling appliances with different cooling characteristics to dissipate the heat. However, the existing cooling mechanisms do not consider the cooling characteristics of the cooling appliances when moving/storing data, resulting in an inefficient use of the cooling appliances and a waste of power. Functionality can be implemented to identify datasets that cause generation of large amounts of heat in the associated physical storage system(s). These heat-intensive datasets can be moved to cooler physical storage system(s) that are identified based, at least in part, on cooling characteristics of the cooling appliances and a proximity of the physical storage system(s) to the cooling appliances. This can ensure that the cooling appliances with the best cooling characteristics are used to cool the most heat intensive datasets. | 06-30-2011 |
20110231889 | SECURITY POLICY AS QUERY PREDICATE - A method, system, and computer usable program product for applying a security policy as a query predicate. A query is received. The query is a request for data directed to a data repository executing in a data processing system. The security policy is identified, the security policy being a security policy applicable to the query. A predicate that corresponds to the security policy is determined. The query is modified to include the predicate. The modified query is sent to the data repository. | 09-22-2011 |
20120016708 | DYNAMIC MANAGEMENT OF INVITATIONS TO A MEETING UTILIZING A CASCADED TIER OF POTENTIAL INVITEES - A computer implemented method dynamically manages invitations to a meeting. A first tier of potential invitees to a meeting and a second tier of potential invitees to the meeting are defined. Members of the second tier of potential invitees have been predetermined to have a lower need to attend the meeting than members of the first tier of potential invitees. Invitations for the meeting are first transmitted to members of the first tier of potential invitees. Invitation acceptance responses are received, and if they fail to reach a predetermined level such that resources for the meeting will be underutilized, additional invitations for the meeting are transmitted to members of the second tier of potential invitees. | 01-19-2012 |
20120078858 | De-Duplicating Data in a Network with Power Management - A method, computer system, and computer program product for managing copies of data objects in a network data processing system. The computer system identifies copies of a data object stored on storage devices. The computer system places the storage devices into groups. Each storage device in a group has a smallest distance from the storage device to a center location for the group as compared to distances to center locations for other groups within the groups. The computer system selects a portion of the copies of the data object for removal from the storage devices based on a management of power for the storage devices such that remaining set of storage devices in each group is capable of handling concurrent requests that have been made historically for the copies of the data object. The computer system removes the portion of the copies of the data object from the storage devices. | 03-29-2012 |
20120215455 | System and Method for Medical Diagnosis Using Geospatial Location Data Integrated with Biomedical Sensor Information - In at least one embodiment, a method and system for accumulating geospatial location data and biomedical data for an individual during his/her travels is provided. In at least one embodiment, a device uses at least one location signal to determine geospatial data and receives a plurality of biomedical signals with both data types being stored for possible later retrieval for providing a diagnosis for the individual if a medical condition arises. An embodiment of the invention provides a method of operation of a device having at least a memory and a communications module where the method includes receiving at least one location signal with the communications module; storing geospatial data obtained at least from the at least one location signal with a time stamp in memory; receiving a plurality of biomedical signals over time from at least one sensor with the communications module; storing biomedical data from the received biomedical signal with a time stamp in memory; and repeating the receiving at least one location signal and storing geospatial data from the at least one location signal in different geographic locations. | 08-23-2012 |
20130103646 | EFFICIENT USE OF MIRRORED STORAGE CLOUDS - For distributing data requests between data centers, a cost reduction module selects a data center from a plurality of data centers to fulfill a data operation request corresponding to mirrored data stored at the plurality of data centers. The selection is based on data center cooling efficiency factors comprising a data storage device efficiency percentage. A response module sends the data operation request to the selected data center. | 04-25-2013 |
20130225147 | CALENDAR-BASED POWER RESERVE - Implementing calendar-based power reserve includes identifying a new calendar entry scheduled into a calendar application of a mobile communications device. The new calendar entry specifies a telephone call. Upon determining a priority indicator has been set for the new calendar entry in the calendar application, the calendar-based power reserve also includes directing a power management component of the mobile communications device to reserve an amount of power for the telephone call, and updating a battery power indicator on the mobile communications device to reflect a capacity of a battery of the mobile communications device. The capacity reflects a current amount of available power for the battery minus the amount of power to reserve. | 08-29-2013 |
20130227318 | CALENDAR-BASED POWER RESERVE - Implementing calendar-based power reserve includes identifying a new calendar entry scheduled into a calendar application of a mobile communications device. The new calendar entry specifies a telephone call. Upon determining a priority indicator has been set for the new calendar entry in the calendar application, the calendar-based power reserve also includes directing a power management component of the mobile communications device to reserve an amount of power for the telephone call, and updating a battery power indicator on the mobile communications device to reflect a capacity of a battery of the mobile communications device. The capacity reflects a current amount of available power for the battery minus the amount of power to reserve. | 08-29-2013 |
20130232179 | ENHANCED STORAGE QUOTA MANAGEMENT FOR CLOUD COMPUTING SYSTEMS - An embodiment of the invention provides a method for storage management in a cloud computing system. More specifically, locations of storage components in the cloud computing system and storage properties of the storage components are identified. The storage properties include the amount of available storage space and/or the cost of storage space. A storage quota for a user of the cloud computing system is generated with a cloud quota management module based on the locations of the storage components and/or the storage properties of the storage components. In at least one embodiment, the storage quota includes the maximum amount of storage allocated to the user in at least one of the storage components. | 09-05-2013 |
20130246357 | MANAGING REDUNDANT IMMUTABLE FILES USING DEDUPLICATION IN STORAGE CLOUDS - A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy. | 09-19-2013 |
20130254508 | CONSIDERATION OF ADJACENT TRACK INTERFERENCE AND WIDE AREA ADJACENT TRACK ERASURE DURING BLOCK ALLOCATION - Embodiments of the present invention provide a system, method, and program product for allocating a block of physical storage space on a write surface of a hard disk drive. A computer system maintains a write count for each block on the hard disk drive. After receiving an allocation request, the computer system identifies one or more candidate blocks of storage space on the hard disk drive that can be selected to fulfill the allocation request. The computer system determines an estimated write count and identifies one or more allocated blocks whose write counts are within a specified number of write operations of the estimated write count. The computer system selects a candidate block based, at least in part, on physical proximity of the candidate block to one or more of the allocated blocks whose write counts are within a specified number of write operations of the estimated write count. | 09-26-2013 |
20130254509 | CONSIDERATION OF ADJACENT TRACK INTERFERENCE AND WIDE AREA ADJACENT TRACK ERASURE DURING DISK DEFRAGMENTATION - Embodiments of the present invention provide a system, method, and program product for defragmenting files on a hard disk drive. A computer system identifies a plurality of movable blocks on a hard disk drive. The computer system categorizes each of the movable blocks into a category based on the write count of each movable block, wherein the movable blocks categorized into a first category have higher write counts than the movable blocks categorized into a second category. The computer system relocates the movable blocks of the first category to a first group of one or more adjacent tracks, and the computer system relocates the movable blocks of the second category to a second group of one or more adjacent tracks, wherein the first group of one or more adjacent tracks and the second group of one or more adjacent tracks share, at most, one common track. | 09-26-2013 |
20130262590 | RECIPIENT CHANGES IN EMAIL THREADS - A tool for notifying a recipient of an email message, belonging to an email thread, that a recipient address has been added to or dropped from the thread. Address fields of the email message received are compared to the address fields of the most recent prior email message in the thread. Addressed that are determined to be added or dropped are stored in the metadata of the email message received so the added or dropped recipient addresses can be accessed to notify recipients of subsequent emails in the email thread. The metadata of previous email messages in the email thread are accessed to notify the recipient of recipient addresses added or dropped between any two consecutive email messages in the thread. | 10-03-2013 |
20130276095 | PASS-PATTERN AUTHENTICATION FOR COMPUTER-BASED SECURITY - Implementing security access includes mapping input elements of an input device to a coordinate system. Each of the input elements is assigned to a point on the coordinate system that is defined by respective coordinate values. The security access also includes receiving a number of inputs via corresponding input elements. An input element assigned to a first input of the number of inputs is denoted as a starting point for a sequence. Beginning with an input in the sequence that immediately follows the first input in the sequence, the security access further includes identifying a directional orientation of each of the input elements as compared to an input element immediately preceding the input element in the sequence, creating a directional pattern sequence from the directional orientation identified for each of the input elements, and providing access to an information source using the directional pattern sequence as an authentication mechanism. | 10-17-2013 |
20130276099 | PASS-PATTERN AUTHENTICATION FOR COMPUTER-BASED SECURITY - Implementing security access includes mapping input elements of an input device to a coordinate system. Each of the input elements is assigned to a point on the coordinate system that is defined by respective coordinate values. The security access also includes receiving a number of inputs via corresponding input elements. An input element assigned to a first input of the number of inputs is denoted as a starting point for a sequence. Beginning with an input in the sequence that immediately follows the first input in the sequence, the security access further includes identifying a directional orientation of each of the input elements as compared to an input element immediately preceding the input element in the sequence, creating a directional pattern sequence from the directional orientation identified for each of the input elements, and providing access to an information source using the directional pattern sequence as an authentication mechanism. | 10-17-2013 |
20130282771 | SYSTEM AND METHOD FOR OPTIMIZING DATA REMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 10-24-2013 |
20130290274 | ENHANCED RELIABILITY IN DEDUPLICATION TECHNOLOGY OVER STORAGE CLOUDS - Methods and systems for enhancing reliability in deduplication over storage clouds are provided. A method includes: determining a weight for each of a plurality of duplicate files based on parameters associated with a respective storage device of each of the plurality of duplicate files; and designating one of the plurality of duplicate files as a master copy based on the determined weight. | 10-31-2013 |
20130290299 | CONTENT-BASED NAVIGATION FOR ELECTRONIC DEVICES - Content-based navigation of an electronic device includes receiving supplemental content to an electronic book. The supplemental content is created separately from the electronic book. The content-based navigation also includes associating an identifier of the electronic book with the supplemental content, storing the supplemental content with the identifier in a storage device, and creating an index to the supplemental content that is searchable by the identifier of the electronic book. The content-based navigation further includes providing end user devices with access to the supplemental content in the storage device via the index. | 10-31-2013 |
20130290599 | LEVERAGING A HYBRID INFRASTRUCTURE FOR DYNAMIC MEMORY ALLOCATION AND PERSISTENT FILE STORAGE - Dynamic allocation of memory in a hybrid system is provided. In particular, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure. | 10-31-2013 |
20130290838 | CONTENT-BASED NAVIGATION FOR ELECTRONIC DEVICES - Content-based navigation of an electronic device includes receiving supplemental content to an electronic book. The supplemental content is created separately from the electronic book. The content-based navigation also includes associating an identifier of the electronic book with the supplemental content, storing the supplemental content with the identifier in a storage device, and creating an index to the supplemental content that is searchable by the identifier of the electronic book. The content-based navigation further includes providing end user devices with access to the supplemental content in the storage device via the index. | 10-31-2013 |
20130339848 | DEDUPLICATING SIMILAR IMAGE OBJECTS IN A DOCUMENT - Systems and methods for image deduplication in a file are provided. A method includes identifying a plurality of similar images (e.g., similar intent images) in an electronic document. The method also includes designating one of the plurality of similar images as a master copy. The method also includes replacing each remaining one of the plurality of similar images, other than the master copy, with one of (i) a duplicate copy of the master copy and (ii) a soft link pointing to the master copy. | 12-19-2013 |
20140013423 | SECURITY MODEL FOR NETWORK INFORMATION SERVICE - Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining. | 01-09-2014 |
20140022073 | FACILITY SANITIZATION MANAGEMENT - A system performs facility sanitization management. The system includes a computer processor and logic executable by the computer processor. The logic performs receiving a condition of an individual and determining the condition is on a pre-defined list of conditions, and receiving tracking information indicative of locations in a facility traversed by the individual. The logic also performs retrieving, from a first database, at least one solution for eliminating elements of the condition, and retrieving, from a second database, pre-defined structures and materials disposed in the locations, and identifying prescribed cleaning methods for the pre-defined structures and materials. The logic further performs creating a clean-up job for each of the locations using the at least one solution and based on the prescribed cleaning methods. | 01-23-2014 |
20140022074 | FACILITY SANITIZATION MANAGEMENT - Facility sanitization management includes receiving a condition of an individual and determining the condition is on a pre-defined list of conditions, and receiving tracking information indicative of locations in a facility traversed by the individual. The facility sanitization management also includes retrieving, from a first database, at least one solution for eliminating elements of the condition, and retrieving, from a second database, pre-defined structures and materials disposed in the locations, and identifying prescribed cleaning methods for the pre-defined structures and materials. The facility sanitization management further includes creating a clean-up job for each of the locations using the solution and based on the prescribed cleaning methods. | 01-23-2014 |
20140026191 | SECURITY MODEL FOR A MEMORY OF A NETWORK INFORMATION SYSTEM - Systems and methods for providing information services are disclosed. A method includes passing an instance an object, invoked by a user, to a memory device at a hardware layer of a network information system, the object being hosted for a tenant of a network information service. The method further includes determining by a processing unit of the memory device that storage of the object is not authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes preventing storage of the instance in the memory device based on the result of the determining. | 01-23-2014 |
20140050369 | Image Advocacy in Portable Computing Devices - A mechanism is provided for identifying one or more eligible image candidates. Responsive to a determination that the storage of a recently captured image raising an allocated captured images memory space in a storage to a point that storage of a next captured image would raise the allocated captured images memory space in the storage above the predetermined threshold, a criteria group in a set of criteria groups is identified to utilize for identification of one or more images candidates from a set of stored images in the storage. The one or more images candidates from the set of stored images in the storage are identified utilizing one or more image identification criteria in the criteria group. The one or more image candidates are then presented to a user. | 02-20-2014 |
20140051404 | AMBIENT SOUND-BASED CALL FUNCTIONS - A mobile communications device includes a computer processor and logic executable by the computer processor. The logic is configured to implement a method. The method includes calculating a decibel level of ambient noise. In response to receiving an incoming call from a calling device, and prior to activating a ringtone on the mobile communications device, the method includes determining that the decibel level exceeds a threshold value, and sending an automated response to the calling device in lieu of connecting the call to the mobile communications device. | 02-20-2014 |
20140051405 | AMBIENT SOUND-BASED CALL FUNCTIONS - Ambient sound-based call functions include calculating, via a computer processor on a mobile communications device, a decibel level of ambient noise. In response to receiving an incoming call from a calling device, and prior to activating a ringtone on the mobile communications device, the ambient sound-based call functions include determining that the decibel level exceeds a threshold value, and sending an automated response to the calling device in lieu of connecting the call to the mobile communications device. | 02-20-2014 |
20140055260 | POLICY-BASED VEHICLE HORN FUNCTIONS - Vehicle horn functions are implemented by deriving a current value associated with a component defined by a policy, retrieving from a data file a volume setting mapped to the current value, and modifying operation of a horn in a vehicle to produce a volume corresponding to the volume setting when an operator of the vehicle activates the horn. | 02-27-2014 |
20140056441 | POLICY-BASED VEHICLE HORN FUNCTIONS - Vehicle horn functions are implemented by a computer processor integral with a vehicle and logic executable by the computer processor. The logic derives a current value associated with a component defined by a policy, retrieves from a data file a volume setting mapped to the current value, and modifies operation of a horn in the vehicle to produce a volume corresponding to the volume setting when an operator of the vehicle activates the horn. | 02-27-2014 |
20140059019 | METHODS AND SYSTEMS FOR DATA CLEANUP USING PHYSICAL IMAGE OF FILES ON STORAGE DEVICES - Methods, systems, and computer program products are provided for optimizing selection of files for deletion from one or more data storage devices to free up a predetermined amount of space in the one or more data storage devices. A method includes analyzing an effective space occupied by each file of a plurality of files in the one or more data storage devices, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for deletion, based on the identified one or more data blocks, and deleting the one or more candidate files for deletion from the one or more data storage devices. | 02-27-2014 |
20140067988 | On-Demand Caching in a WAN Separated Distributed File System or Clustered File System Cache - A mechanism is provided in a data processing system for on-demand caching in a wide area network (WAN) separated distributed file system or clustered file system. The mechanism monitors file access by a plurality of cache sites in the WAN separated distributed file system or clustered file system. The mechanism identifies access patterns by cache sites. The mechanism shares the access patterns with the plurality of cache sites. A given cache site within the plurality of cache sites combines the access patterns with local access information and identifies files to pre-fetch based on the combined information. | 03-06-2014 |
20140068206 | METHODS AND SYSTEMS FOR DATA CLEANUP USING PHYSICAL IMAGE OF FILES ON STORAGE DEVICES - Methods, systems, and computer program products are provided for optimizing selection of files for eviction from a first storage pool to free up a predetermined amount of space in the first storage pool. A method includes analyzing an effective space occupied by each file of a plurality of files in the first storage pool, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for eviction, based on the identified one or more data blocks, and evicting the one or more candidate files for eviction from the first storage pool to a second storage pool. | 03-06-2014 |
20140115029 | SELECTIVE DATA TRANSFER BETWEEN A SERVER AND CLIENT - A method and apparatus for transferring a file from a server to a client in sections is disclosed. In one embodiment, a method includes a server receiving a request from a client for a file. The file has a first section and second section. Each section, respectively, has a first security level and a second security level. A determination of a security protocol for transmission of each file section is determined using classification information and a template. The file sections are transmitted over a channel between the server and the client using the respective first security protocol and second security protocol. | 04-24-2014 |
20140189196 | DETERMINING WEIGHT VALUES FOR STORAGE DEVICES IN A STORAGE TIER TO USE TO SELECT ONE OF THE STORAGE DEVICES TO USE AS A TARGET STORAGE TO WHICH DATA FROM A SOURCE STORAGE IS MIGRATED - The present invention relates to a method, system, and computer program product for determining storage device weight values to use to select one of the storage devices to use as a target storage to which data from a source storage is migrated. A determination is made, for each of the storage devices, of static parameter values for static parameters comprising attributes of the storage device and dynamic parameter values for dynamic parameters providing device health information determined by accessing the storage device to determine operational conditions at the storage device. Storage device weight values are determined as a function of the static parameter values and the dynamic parameter values of the device. The determined storage device weight values are used to select one of the storage devices as the target storage to which data from the source storage is migrated. | 07-03-2014 |
20140189268 | HIGH READ BLOCK CLUSTERING AT DEDUPLICATION LAYER - Methods, systems, and computer program products are provided for deduplicating data mapping a plurality of file blocks of selected data to a plurality of logical blocks, deduplicating the plurality of logical blocks to thereby associate each logical block with a corresponding physical block of a plurality of physical blocks located on a physical memory device, two or more of the corresponding physical blocks being non-contiguous with each other, determining whether one or more of the corresponding physical blocks are one or more frequently accessed physical blocks being accessed at a frequency above a threshold frequency and being referred to by a common set of applications, and relocating data stored at the one or more frequently accessed physical blocks to different ones of the plurality of physical blocks, the different ones of the plurality of physical blocks being physically contiguous. | 07-03-2014 |
20140195488 | Intelligent Selection of Replication Node for File Data Blocks in GPFS-SNC - A mechanism is provided in a data processing system for replicating writing of a file with striping. The mechanism writes a file at an owner node within a plurality of nodes in a data processing system. The mechanism divides the file into a plurality of file chunks. The mechanism identifies at least one replication node within the plurality of nodes having a duplicate copy of a respective file chunk within the plurality of file chunks. The mechanism selects a plurality of replication nodes for the plurality of file chunks based on identification at least one replication node within the plurality of nodes having a duplicate copy of a respective file chunk and replicates the file at the plurality of replication nodes based on the selection of the plurality of replication nodes. | 07-10-2014 |
20140195636 | Cloud Based Data Migration and Replication - A mechanism is provided in a data processing system for data replication. The mechanism divides a set of data to be replicated into a plurality of slices. Each slice of the plurality of slices is to be copied from a primary site to a master secondary site within a plurality of secondary sites. The plurality of secondary sites comprises the master secondary site and at least one subsidiary peer site. The mechanism copies the plurality of slices from the primary site to the plurality of secondary sites such that the master secondary site stores a first slice of the set of data and each of the at least one subsidiary peer site stores a corresponding slice of the set of data. Responsive to completion of copying the plurality of slices to the plurality of secondary sites, for each of the at least one subsidiary peer site, the mechanism initiates copying of the corresponding slice of the set of data to the master secondary site. | 07-10-2014 |
20140201478 | De-Duplication Aware Secure Delete - A mechanism is provided in a data processing system for de-duplication aware secure delete. Responsive to receiving a secure delete request for a file, the mechanism identifies a list of file blocks to be securely deleted from a physical disk device. Responsive to determining at least one virtual block of another file refers to a given disk block corresponding to a file block in the list, the mechanism copies the given disk block to generate a copied disk block in the physical disk device and updates a pointer of the at least one virtual block to refer to the copied disk block. The mechanism writes a secure delete pattern for each file block in the list of file blocks to a disk block in the physical disk device without performing de-duplication processing. | 07-17-2014 |
20140207955 | STORAGE MANAGMENT IN A MULTI-TIERED STORAGE ARCHITECTURE - Resource management processes are implemented by a computer processor and logic executable by the computer processor. The logic is configured to calculate a performance weight for each end user of an application executing on the computer processor. The performance weight is calculated as a function of an activity level determined for each end user and a type of the application. The logic is also configured to calculate an input/output weight for each end user from a combination of an input/output requirement and the performance weight. The input/output requirement is indicative of an amount of storage resources of a multi-tiered storage system associated with anticipated activities of the end user. The logic is further configured to assign an amount of the storage resources for each end user based on the input/output weight. | 07-24-2014 |
20140207956 | STORAGE MANAGMENT IN A MULTI-TIERED STORAGE ARCHITECTURE - Resource management processes are implemented by a computer processor and logic executable by the computer processor. The logic is configured to calculate a performance weight for each end user of an application executing on the computer processor. The performance weight is calculated as a function of an activity level determined for each end user and a type of the application. The logic is also configured to calculate an input/output weight for each end user from a combination of an input/output requirement and the performance weight. The input/output requirement is indicative of an amount of storage resources of a multi-tiered storage system associated with anticipated activities of the end user. The logic is further configured to assign an amount of the storage resources for each end user based on the input/output weight. | 07-24-2014 |
20140222945 | Boosting Remote Direct Memory Access Performance Using Cryptographic Hash Based Approach - A mechanism is provided in a data processing system for performing a remote direct memory access operation. Responsive to receiving in a network interface controller a hash value of data to be copied from a source address in a source node to a destination address in a destination node in the remote direct memory access operation, the network interface controller performs a lookup operation in a translation protection table in the network interface controller to match the hash value to a hash value for data existing in memory of the destination node. Responsive to the network interface controller finding a match in the translation protection table, the network interface controller completes the remote direct memory access operation without transferring the data from the source node to the destination node. | 08-07-2014 |
20140223240 | SELECTIVE MONITORING OF ARCHIVE AND BACKUP STORAGE - Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine. | 08-07-2014 |
20140250089 | SYSTEM AND METHOD FOR OPTIMIZING DATA REMANENCE OVER HYBRID DISK CLUSTERS USING VARIOUS STORAGE TECHNOLOGIES - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to optimize data remanence over hybrid disk clusters using various storage technologies, determine one or more data storage technologies accessible by a file system, and determine secure delete rules for each of the one or more storage technologies accessible by the file system. The secure delete rules include a number of overwrites required for data to be securely deleted from each of the one or more storage technologies. The programming instructions are further operable to provide the secure delete rules to the file system upon a request for deletion of data for each of the one or more storage technologies a specific amount of times germane to secure delete data from the one or more storage technologies. | 09-04-2014 |
20140281330 | Apparatus and Method for Resource Alerts - A method of managing resource allocations in a storage system provisioning system, including monitoring write applications that result in new storage block allocations during a current time slice, calculating a time remaining to exceed actual capacity of allocated storage blocks, if the calculated remaining time does exceed length of next time slice immediately transmitting an alert when an estimated number of future write requests exceeds a predetermined threshold, and if the calculated remaining time does exceed length of next time slice immediately transmitting an alert when an estimated number of future write requests exceeds a predetermined threshold, wherein a duration of a time slice is set by a storage system administrator based upon a current storage library setup and a time required to arrange a new storage device when a thin provisioning device is going out of disk space. | 09-18-2014 |
20140304268 | OPTIMIZED PRE-FETCH ORDERING USING DE-DUPLICATION INFORMATION TO ENHANCE NETWORK PERFORMANCE - A computer determines a degree of information duplication between at least two files included in an original pre-fetch list. The computer generates a re-ordered pre-fetch list by re-ordering the files included in the original pre-fetch list. The re-ordering is based, at least in part, on the degree of information duplication between the two files included in the original pre-fetch list. The files included in the original pre-fetch list are re-ordered by grouping files containing higher degrees of duplicate information closer together in the re-ordered pre-fetch list. | 10-09-2014 |
20140310455 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DEDUPLICATION AWARE QUALITY OF SERVICE OVER DATA TIERING - A method for ensuring compliance of service levels corresponding to file-system operations in a deduplicated, tiered storage system comprising storage devices of varying performance levels, each of the performance levels being associated with at least one service level, includes performing a deduplication remapping operation so that a data item corresponding to a higher service level, is stored as an original on a higher performance storage tier while duplicates of the data item corresponding to a lower service level exist in lower performance storage tier at least in part as pointers to the data item on the higher performance storage tier. | 10-16-2014 |
20140325075 | MOBILE DEVICE WORKLOAD MANAGEMENT FOR CLOUD COMPUTING USING SIP AND PRESENCE TO CONTROL WORKLOAD AND METHOD THEREOF - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to manage workload for cloud computing by transferring workload to at least one mobile device using Session Initiation Protocol (SIP). | 10-30-2014 |
20140325616 | FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH - Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user. | 10-30-2014 |
20140358568 | Healthcare Management - A computer system obtains data from at least one sensor monitoring for health risk conditions, wherein a list of health risk conditions are pre-defined and stored in a server. The computer system determines that a health risk condition exists within an area based on the obtained data. The computer system determines a sanitization procedure for the health risk condition. The computer system initiates sanitization operations for the area according to the determined sanitization procedure. | 12-04-2014 |
20140358573 | HEALTHCARE MANAGMENT - A computer system obtains data from at least one sensor monitoring for health risk conditions, wherein a list of health risk conditions are pre-defined and stored in a server. The computer system determines that a health risk condition exists within an area based on the obtained data. The computer system determines a sanitization procedure for the health risk condition. The computer system initiates sanitization operations for the area according to the determined sanitization procedure. | 12-04-2014 |
20150032283 | DATA CENTER COOLING - Embodiments of the invention provide techniques of monitoring and controlling temperature in a data center having a plurality of systems. Operating parameters of one or more cooling devices in the data center may be dynamically adjusted based on characteristics of the data center. An associated method may include monitoring in real time temperature and data flow patterns with respect to the systems in a zone of the data center, computing an optimal temperature based on the real time data and historical data collected in a repository, and activating one or more cooling devices in the zone upon determining that the temperature in the zone exceeds a predefined threshold. | 01-29-2015 |
20150039570 | MANAGING REDUNDANT IMMUTABLE FILES USING DEDUPLICATION IN STORAGE CLOUDS - A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy. | 02-05-2015 |
20150046410 | ENHANCED RELIABILITY IN DEDUPLICATION TECHNOLOGY OVER STORAGE CLOUDS - Methods and systems for enhancing reliability in deduplication over storage clouds are provided. A method includes: determining a weight for each of a plurality of duplicate files based on parameters associated with a respective storage device of each of the plurality of duplicate files; and designating one of the plurality of duplicate files as a master copy based on the determined weight. | 02-12-2015 |
20150046474 | Image Analysis - Mechanisms for displaying an ordered sequence of images are provided. The mechanisms receive a search query as input from a user. The search query includes a start point and an end point of a virtual tour. The start point and the end point determine a boundary of the virtual tour. Based on the search query, images that are within the boundary of the virtual tour defined in the search query are collected. At least a subset of the collected images are displayed in an ordered sequence in accordance with the boundary of the virtual tour. | 02-12-2015 |
20150046597 | SPATIAL SECURITY IN A SESSION INITIATION PROTOCOL (SIP) CONFERENCE - In a method for securing a session initiation protocol (SIP) conference session, first location information of a SIP conference session invitee attempting to connect to a SIP conference session is received. The computer determines that the received first location information at least partially matches a location requirement assigned to the invitee attempting to connect to the SIP conference session. The computer causes the invitee to be connected to the SIP conference session. | 02-12-2015 |
20150058582 | SYSTEM AND METHOD FOR CONTROLLING A REDUNDANCY PARITY ENCODING AMOUNT BASED ON DEDUPLICATION INDICATIONS OF ACTIVITY - According to one embodiment, a method includes determining, using a processor, which physical blocks are priority physical blocks based on at least one of: a number of application blocks referencing the physical block, and a number of accesses to the physical block, creating a reference to each priority physical block, and outputting the reference. According to another embodiment, a method includes receiving a reference to one or more priority physical blocks in a storage pool, and adjusting an amount of redundancy parity encoding for each of the one or more priority physical blocks based on the reference. | 02-26-2015 |
20150058583 | SYSTEM AND METHOD FOR IMPROVED PLACEMENT OF BLOCKS IN A DEDUPLICATION-ERASURE CODE ENVIRONMENT - In one embodiment, a method includes receiving a block set comprising one or more blocks; generating a hash value for each block in the block set; determining whether physical blocks stored on computer readable storage media are duplicates of any block in the block set; and for each block in the block set that has a duplicate thereof: map the block to the duplicate when the duplicate is on one of the computer readable storage media that does not have any other block in the block set written and/or mapped thereto, and write the block to one of the computer readable storage media that does not have any other block in the block set written and/or mapped thereto when the duplicate is stored on a computer readable storage media that has another block in the block set written and/or mapped thereto, and map the duplicate to the written block. | 02-26-2015 |
20150067065 | TRANSMISSION OF MESSAGES AND NOTIFICATIONS IN VIRTUALIZED WIRELESS MOBILE COMPUTING DEVICES - A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message. | 03-05-2015 |
20150074174 | SERVICE AGREEMENT PERFORMANCE VALIDATION IN A CLOUD HOSTED ENVIRONMENT - Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application. | 03-12-2015 |
20150074175 | SERVICE AGREEMENT PERFORMANCE VALIDATION IN A CLOUD HOSTED ENVIRONMENT - Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application. | 03-12-2015 |
20150074368 | THIN PROVISIONING STORAGE DEVICES IN CONNECTION WITH SECURE DELETE OPERATIONS - A method for improving thin provisioning storage devices in connection with secure delete operations is provided. The method may include receiving at a physical storage device a first indicator to initiate writing a secure delete pattern to a plurality of physical storage locations. The secure delete pattern is written to a plurality of allocated physical storage locations based on the received first indicator. When a second indicator is set, the end of the secure delete pattern is reached. The thin provisioning storage device, upon receiving the second indicator, securely erases the plurality of storage device metadata regions where the mapping of virtual storage locations to allocated physical storage locations is stored. Requests to write a secure delete pattern for virtual storage locations without corresponding allocated physical storage locations are ignored. | 03-12-2015 |